• Title/Summary/Keyword: Audit Time

Search Result 160, Processing Time 0.038 seconds

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

A study on the Effective Selection of the Personal Information Audit Subject Using Digital Forensic (디지털 포렌식 기법을 활용한 효율적인 개인정보 감사 대상 선정 방안 연구)

  • Cheon, Jun-Young;Lee, Sang-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.5
    • /
    • pp.494-500
    • /
    • 2014
  • Recently the leak of personal information from in-house and contract-managed companies has been continually increasing, which leads a regular observation on outsourcing companies that perform the personal information management system to prevent dangers from the leakage, stolen and loss of personal information. However, analyzing many numbers of computers in limited time has found few difficulties in some circumstances-such as outsourcing companies that own computers that have personal information system or task continuities that being related to company's profits. For the reason, it is necessary to select an object of examination through identifying a high-risk of personal data leak. In this paper, this study will formulate a proposal for the selection of high-risk subjects, which is based on the user interface, by digital forensic. The study designs the integrated analysis tool and demonstrates the effects of the tool through the test results.

The Institutional Elements and Institutional Congruence of National and Local Accounting System (국가회계와 지방회계의 구성요소와 제도적 정합성)

  • Lim, Dongwan
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.10
    • /
    • pp.343-359
    • /
    • 2017
  • This study aims to analyze the government accounting system of South Korea on the institutional complex and institutional congruence of new institutional theory and suggests policy reform for the system. I researched the literatures on the national and local accounting system and compiled research materials from the Ministry of Strategy and Finance, the Ministry of Interior and Safety, the Board of Audit and Inspection, and Government Accounting and Finance Statistics Center websites. Analysis showed that the government accounting system consists of various elements in institutional complex and the congruence level of national and local accounting system of South Korea is low in production, disclosure, and application of information. The suggestions of this study include: introducing accounting position recruitment, adopting government audit system, and improving cooperation between national accounting organizations and local accounting organizations for reliable information production; disclosing real time information and revealing information linking national and local accounting for transparent information disclosure; educating information user, providing accurate cost and available financial analysis indicators, introducing chief financial officer, and expanding range of consolidated national financial statements for information application.

Outsourced Storage Auditing Scheme using Coefficient Matrix (계수행렬을 이용한 외부 스토리지 무결성 검증 기법)

  • Eun, Hasoo;Oh, Heekuck;Kim, Sangjin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.483-488
    • /
    • 2013
  • Users can access their data anywhere, at any time by using outsourced storage. But they cannot know how service provider manage the data. Even user cannot know when data damaged. To solve these problems, the outsourced storage auditing schemes has been proposed. Most proposed schemes are based on Homomorphic Verifiable Tags. But it has computational efficiency limitation because data used to exponent. In this paper, we propose a novel approach to outsourced storage auditing scheme using coefficient matrix. In the proposed scheme, data used to auditing by coefficient matrix form. Auditing procedures are proceed as solving the linear simultaneous equation. The auditor can audit easily by solving the equation using solution vector. The auditor can audit the n size data using sqrt(n) size data through out proposed scheme.

Windows Artifacts Analysis for Collecting Cryptocurrency Mining Evidence (암호화폐 채굴 증거 수집을 위한 윈도우 아티팩트 분석 기술 연구)

  • Si-Hyeon Park;Seong-Hun Han;Won-hyung Park
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.121-127
    • /
    • 2022
  • Recently, social issues related to cryptocurrency mining are continuously occurring at the same time as cryptocurrency prices are rapidly increasing. In particular, since cryptocurrency can be acquired through cryptographic operation, anyone with a computer can easily try mining, and as the asset value of major cryptocurrencies such as Bitcoin and Ethereum in creases, public interest is increasing. In addition, the number of cases where individuals who own high-spec computers mine cryptocurrencies in various places such as homes and businesses are increasing. Some miners are mining at companies or public places, not at home, due to the heat problem of computers that consume a lot of electrical energy, causing various problems in companies as well as personal moral problems. Therefore, this study studies the technology to obtain evidence for the traces of mining attempts using the Windows artifacts of the computers that mined cryptocurrency. Through this, it is expected that it can be used for internal audit to strengthen corporate security.

Alcohol Problems and Related Service Needs in Urban Korean Community (경기도 일지역의 문제음주실태와 알코올 미충족욕구 조사연구)

  • Yang, Jaewon;Whang, Soo Yeon;Hwang, In-Sook;Kim, Sun-Mee;Bae, Gi-Hye;Lee, Hong-Jae;Ko, Young-Hoon
    • Korean Journal of Psychosomatic Medicine
    • /
    • v.21 no.1
    • /
    • pp.62-71
    • /
    • 2013
  • Objectives : The purpose of this study is to investigate the characteristics of drinking patterns and the prevalence of hazardous drinking and alcohol use disorder with the assessment of alcohol policy needs in community population of urban city in Korea. Methods : Data was collected from 1,000 residents in a single urban city in Korea, from June 1 to July 31, 2011 by a questionnaire. As research tools, socio-demographic characteristics composed of variables based on study purpose, alcohol problems and alcohol use disorder state scales composed with Alcohol Use Disorder Identification Test(AUDIT) and Cut down, Annoyed, Guilty, Eye-opener(CAGE), and the assessment of alcohol policy needs in community population questions were used. Results : The lifetime experience of alcohol drinking was 97.4%. For the frequency of drinking, 21.9% of population responded 2 to 4 times per weekly. 24.4% of male had one time or more high risk drinking, defined as having four or more drinks in a sitting, per week. 51.6% experienced the first time drinking of alcohol in adolescence. The lifetime prevalence of hazardous drinking and alcohol use disorder were 14.9% and 3.3%, respectively using AUDIT. Alcohol use disorder were 9.6% with the CAGE scale. Problem drinking were 8.4% in this study. They requested the program such as prevention education(57.2%), construction of liaison system to treatment facilities(50.1%), alcohol counseling and intervention(41.7%), and rehabilitation program(39.8%). Conclusions : These results demonstrate that alcohol problem and alcohol use disorder were much prevalent, and these problem started in the earlier age. It is necessary to develop an effective alcohol prevention program or policy with considering the needs in community population.

  • PDF

The Influence of Health Behaviors and Health related Quality of Life on Depression among Korean Female Problem Drinker (여성 문제음주자의 건강행태와 건강관련 삶의 질이 우울에 미치는 영향)

  • Park, Min Hee;Jeon, Hae Ok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.11
    • /
    • pp.7844-7854
    • /
    • 2015
  • The purpose of this study is to investigate the drinking status, health behaviors, health related quality of life and depression among female problem drinkers and to examine the impact of their health behavior and health related quality of life on depression. The data of this study were derived from the 5th Korea National Health and Nutrition Examination Survey conducted during January 2010-December 2012. As for the subjects of this study, 328 female problem drinkers were selected who were classified as those with 8 or higher scores in the AUDIT, and complex samples analysis was conducted using the IBM SPSS Statistics version 21.0 software package. The study result showed that the risk of experiencing depression increased among subjects with a high level of perceived stress and subjects with a low level of health related quality of life. In addition, the risk of experiencing depression increased among subjects with 1-4 hours of sleep time compared to subjects with 8 or more hours of sleep time. Accordingly, it would be necessary to pay attention to stress, sleep time and health related quality of life that are related influencing factors for the improvement of depression and mental health of Korean female problem drinkers.

A case study on productivity improvement through the analysis of Traffic Safety System (교통안전제도분석을 통한 생산성향상에 관한 사례연구)

  • Kim, Ha-Gon;Sin, Jae-Cheon;Kim, Bu-Yeol;Choe, Jong-Su;Choe, Chun-Ho;Gang, Gyeong-Sik
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2010.11a
    • /
    • pp.41-61
    • /
    • 2010
  • With increasing the quality of life in proportion to the national income, we have had cars as more convenient and safe means of transportation for a long time. The more we have the benefits from cars, the more seriously we should consider problems such as the destruction of the environment by air pollution, traffic accidents, parking problems, traffic congestion, etc. as social cost caused by the increase of cars. Among them, the traffic accidents are very serious, especially the accidents of the business cars occurs five times more than those of the private cars. Therefore if we analyze the cases of the various kinds of syst.em, test the results and apply them to business cars, we will reduce the traffic accidents of business cars.

  • PDF

An Intelligent Intrusion Detection Model

  • Han, Myung-Mook
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.224-227
    • /
    • 2003
  • The Intrsuion Detecion Systems(IDS) are required the accuracy, the adaptability, and the expansion in the information society to be changed quickly. Also, it is required the more structured, and intelligent IDS to protect the resource which is important and maintains a secret in the complicated network environment. The research has the purpose to build the model for the intelligent IDS, which creates the intrusion patterns. The intrusion pattern has extracted from the vast amount of data. To manage the large size of data accurately and efficiently, the link analysis and sequence analysis among the data mining techniqes are used to build the model creating the intrusion patterns. The model is consist of "Time based Traffic Model", "Host based Traffic Model", and "Content Model", which is produced the different intrusion patterns with each model. The model can be created the stable patterns efficiently. That is, we can build the intrusion detection model based on the intelligent systems. The rules prodeuced by the model become the rule to be represented the intrusion data, and classify the normal and abnormal users. The data to be used are KDD audit data.

  • PDF

An Empirical Study on the Development Propensity and Quality of the Public Software Project (공공소프트웨어 사업의 개발 성향과 품질에 대한 실증적 연구)

  • Kim Yong Kyong;Kim Pyung Kee
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.4
    • /
    • pp.147-167
    • /
    • 2004
  • This study was empirically performed to demonstrate the development propensity and quality of the public software projects in Korea. Tile sample employed in this study contains 168 auditing reports on 107 public software projects which were carried out in the period of 1998 to 2003. The important findings of this study can be summarized as follows. The quality issue in the development process is getting more important with the lapse of time. In addition, the importance of end users' conveniency increases from year to year. Although the Pareto Principle(20 : 80 principle) is not applied strictly, most problems are caused by a few items. Finally, we find evidence that the overall Quality of public softwares is positively influenced by the information system auditing.

  • PDF